0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (2)
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Windows Server 2012 Security from End to Edge and Beyond - Architecting, Designing, Planning, and Deploying Windows Server 2012... Windows Server 2012 Security from End to Edge and Beyond - Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions (Paperback, New)
Thomas W. Shinder, Yuri Diogenes, Debra Littlejohn Shinder
R2,017 Discovery Miles 20 170 Ships in 12 - 17 working days

"Windows Server 2012 Security from End to Edge and Beyond" shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access.

Authors Tom Shinder and Yuri Diogenes, both Microsoft employees, bring you insider knowledge of the Windows 8 platform, discussing how to deploy Windows security technologies effectively in both the traditional datacenter and in new cloud-based solutions. With this book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features in a test lab and in pilot and production environments.

The book's revolutionary "Test Lab Guide" approach lets you test every subject in a predefined test lab environment. This, combined with conceptual and deployment guidance, enables you to understand the technologies and move from lab to production faster than ever before. Critical material is also presented in key concepts and scenario-based approaches to evaluation, planning, deployment, and management. Videos illustrating the functionality in the Test Lab can be downloaded from the authors blog http: //blogs.technet.com.b.security_talk/. Each chapter wraps up with a bullet list summary of key concepts discussed in the chapter.
Provides practical examples of how to design and deploy a world-class security infrastructure to protect both Windows 8 and non-Microsoft assets on your systemWritten by two Microsoft employees who provide an inside look at the security features of Windows 8 Test Lab Guides enable you to test everything before deploying live to your system"

How to Cheat at Configuring ISA Server 2004 (Paperback): Debra Littlejohn Shinder, Thomas W. Shinder How to Cheat at Configuring ISA Server 2004 (Paperback)
Debra Littlejohn Shinder, Thomas W. Shinder
R991 Discovery Miles 9 910 Ships in 12 - 17 working days

How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step guide to getting one of Microsoft's most complex server products up and running. While books twice its size may be perfect for network designers and security specialists, this is written for the person in the trenches actually running the network day to day.
How to Cheat at Configuring ISA Server 2004 is written for the vast majority of Windows System Administrators with too much to do and too little time in which to do it. Unlike books twice its size, this is a concise, to-the-point guide.
* Administrators daily jobs - too many mission critical tasks in too little time. A quick reference to ISA Server
* Written by Dr. Tom Shinder, the undisputed authority on Installing, Configuring, Managing and Troubleshooting ISA Server
* Includes independent advice on when the "Microsoft Way" works, and when another approach might be more appropriate to your situation

Scene of the Cybercrime (Paperback, 2nd edition): Debra Littlejohn Shinder, Michael Cross Scene of the Cybercrime (Paperback, 2nd edition)
Debra Littlejohn Shinder, Michael Cross
R1,319 Discovery Miles 13 190 Ships in 12 - 17 working days

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one of the first books that educated IT security professionals and law enforcement how to fight Cybercrime. Over the past 5 years a great deal has changed in how computer crimes are perpetrated and subsequently investigated. Also, the IT security and law enforcement communities have dramatically improved their ability to deal with Cybercrime, largely as a result of increased spending and training. According to the 2006 Computer Security Institute's and FBI's joint Cybercrime report: 52% of companies reported unauthorized use of computer systems in the prior 12 months. Each of these incidents is a Cybecrime requiring a certain level of investigation and remediation. And in many cases, an investigation is mandates by federal compliance regulations such as Sarbanes-Oxley, HIPAA, or the Payment Card Industry (PCI) Data Security Standard.
Scene of the Cybercrime, Second Edition is a completely revised and updated book which covers all of the technological, legal, and regulatory changes, which have occurred since the first edition. The book is written for dual audience; IT security professionals and members of law enforcement. It gives the technical experts a little peek into the law enforcement world, a highly structured environment where the "letter of the law" is paramount and procedures must be followed closely lest an investigation be contaminated and all the evidence collected rendered useless. It also provides law enforcement officers with an idea of some of the technical aspects of how cyber crimes are committed, and how technology can be used to track down and build a case against the criminals who commit them. Scene of the Cybercrime, Second Editions provides a roadmap that those on both sides of the table can use to navigate the legal and technical landscape to understand, prevent, detect, and successfully prosecute the criminal behavior that is as much a threat to the online community as "traditional" crime is to the neighborhoods in which we live. Also included is an all new chapter on Worldwide Forensics Acts and Laws.

* Companion Web site provides custom tools and scripts, which readers can download for conducting digital, forensic investigations.
* Special chapters outline how Cybercrime investigations must be reported and investigated by corporate IT staff to meet federal mandates from Sarbanes Oxley, and the Payment Card Industry (PCI) Data Security Standard
* Details forensic investigative techniques for the most common operating systems (Windows, Linux and UNIX) as well as cutting edge devices including iPods, Blackberries, and cell phones.

Configuring ISA Server 2004 (Paperback, 2nd ed): Thomas W. Shinder, Debra Littlejohn Shinder Configuring ISA Server 2004 (Paperback, 2nd ed)
Thomas W. Shinder, Debra Littlejohn Shinder; Edited by Martin Grasdal
R872 Discovery Miles 8 720 Ships in 12 - 17 working days

Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft.
Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft. This book will be featured prominently on the ISAserver.org home page as well as referenced on Microsoft TechNet and ISA Server Web pages. Tom and Deb's unparalleled technical expertise combined with prime on-line marketing opportunities will make this the #1 book again in the ISA Server market.
* This book will provide readers with unparalleled information on installing, confiuguring, and troubleshooting ISA Server 2004 by teaching readers to: * Deploy ISA Server 2004 in small businesses and large organizations.
* Learn how to configure complex DMZ configurations using ISA Server 2004's new network awareness features and built-in multinetworking capabilities.
* Learn how to take advantage of ISA Server 2004's new VPN capabilities

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Semicolon
Britt Sayler Hardcover R606 Discovery Miles 6 060
Your Home in Heaven
Lynn E Davis Hardcover R733 Discovery Miles 7 330
Sam and Uncle Joe - Learning to Serve…
Phoebe London Hardcover R626 Discovery Miles 6 260
When Mum went to Heaven
Chloe Young Hardcover R450 Discovery Miles 4 500
June Bloomed Anyway
Ivy Strohmaier Hardcover R489 Discovery Miles 4 890
I Am Not Your Perfect Mexican Daughter
Erika L Sanchez Paperback R340 R290 Discovery Miles 2 900
How to Make Friends with the Dark
Kathleen Glasgow Paperback  (1)
R270 R216 Discovery Miles 2 160
Drowning Days
Muriel Ellis Pritchett Hardcover R558 Discovery Miles 5 580
My Boston Terrier Adventures (with Rudy…
L. A Meyer Hardcover R573 R483 Discovery Miles 4 830
Concert in the Sky
Joe " The Gamer" Petraro Hardcover R555 Discovery Miles 5 550

 

Partners